Query of policy matching logs on the USG6000 series

Context
Only the USG6000 supports policy matching logs, and such logs can be displayed only when a hard disk is installed.
For the USG6650/6660/6670/6680, the policy matching log page is displayed no matter whether hard disks are installed.
The firewall is deployed between the Internet and the network to be protected. If traffic matches a security policy, a policy matching log is generated.

By checking operation logs, you can view records for operations such as login, logout, and device configuration, learn the device management history, and improve device security.
Context
Only the USG6000 supports operation logs, and such logs can be displayed only when a hard disk is installed.
Note:
For the USG6650/6660/6670/6680, the operation log page is displayed no matter whether hard disks are installed.
The firewall is deployed between the Internet and the network to be protected. When the IP address or login mode is configured for an administrator to log in to the firewall or the administrator performs any operation after login, operation logs are generated.
Procedure
1. Choose Monitor > Log > Operation Log to view operation logs.
2. Choose Customize and select/deselect conditions for threat log display.
3. (Optional) Click Export to export operation logs in CSV format to the management PC.